linux520 / g0tr00t
Try various exploits to get root
☆19Updated 11 years ago
Alternatives and similar repositories for g0tr00t:
Users that are interested in g0tr00t are comparing it to the libraries listed below
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- A web app scanner☆26Updated 11 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- ☆20Updated last year
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 6 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- CMS Exploit Scripts☆12Updated 9 years ago
- cross site scripting framework plugin for metasploit☆17Updated 12 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- ☆47Updated 9 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Universal stack-based buffer overfow exploitation tool☆23Updated 11 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- Juniper backdoor☆13Updated 9 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Updated 6 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- A BurpSuite extension for lair☆28Updated 7 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 10 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Updated 10 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- pwning & info gathering via user browser☆39Updated 10 years ago
- Proof of Concepts, Exploits☆28Updated 3 weeks ago
- Projects and POCs☆60Updated 10 years ago